Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Disruption: The True Cost of an Industrial Cyber Security Incident

Industrial control systems are essential to the smooth operation of various national critical infrastructure. While once segmented from the web, these systems are now becoming increasingly more networked and remotely accessible as organizations transform to meet the digital age. This development potentially exposes industrial control systems to digital threats.

Five Ways AI is Cutting Costs in Start-Ups and Small Businesses

Companies of various sizes have embraced the concept of the lean startup. Organizations are continually looking for ways to save money and stretch limited budgets to the max. Thanks to the growth in diverse applications of artificial intelligence, technology is helping companies achieve this goal.

Canada's Recommendations for Upholding Digital Security in the Financial Sector

On 29 July 2019, Capital One disclosed a digital security incident in which an outside individual gained unauthorized access to its systems. That party then leveraged their access to obtain the personal and financial information of Capital One cardholders as well as of individuals who at one point applied for a credit card. Overall, the bank holding company estimated that the breach affected 100 million Americans as well as six million Canadians.

IBM Study Shows Data Breach Costs on the Rise

For the 14th consecutive year, IBM Security released its annual Data Breach Report that examines the financial impact of data breaches on organizations. According to the report, the cost of a data breach has risen 12% over the past 5 years to $3.92 million per incident on average. These rising expenses are representative of the multi-year financial impact of breaches, increased regulation and the complex process of resolving criminal attacks.

A Quick Guide To Visibility And Smarter Monitoring

Companies of all sizes are learning that when it comes to keeping their digital assets safe; being able to monitor what’s going on within their environments makes all the difference. Unfortunately, those same companies have struggled with basic fundamentals such as maintaining accurate asset inventories and deploying the right technology on those assets to gain visibility into their security posture – two components critical to the effectiveness of traditional visibility programs.

How to prevent crime on the Deep Web and Dark Web

Sir Tim Berners-Lee invented the World Wide Web in 1989, and then it became available to the general public by 1991. The web is an internet service that was designed to help scientists and academics exchange information more effectively. But by the late 1990s, the web helped to make the internet popular and accessible to ordinary people all over the world. Over thirty years after Berners-Lee’s first proposal for the web-- that technology has revolutionized everyone’s lives.

Detectify now checks for File Disclosure in SSL VPNs - Pulse Secure and Fortinet

Pulse Secure and Fortinet have announced advisories detailing a critical vulnerability found that enables an unauthenticated user to conduct file disclosure in SSL VPN. Thanks to Detectify Crowdsource hackers, Detectify checks your website for these vulnerabilities and will alert you if your version of Pulse Secure or Fortinet gateway is affected.

What is a Cyber Attack?

A cyber attack (or cyberattack) is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to a computer system, infrastructure, network, or any other smart device. In some cases, cyber attacks can be part of a nation-states cyber warfare or cyber terrorism efforts, while other cybercrimes can be employed by individuals, activist groups, societies or organizations. Strong organizational wide cyber security controls are now more important than ever.